WO2019045823A1 - Prise de notes sur écran de verrouillage - Google Patents

Prise de notes sur écran de verrouillage Download PDF

Info

Publication number
WO2019045823A1
WO2019045823A1 PCT/US2018/037046 US2018037046W WO2019045823A1 WO 2019045823 A1 WO2019045823 A1 WO 2019045823A1 US 2018037046 W US2018037046 W US 2018037046W WO 2019045823 A1 WO2019045823 A1 WO 2019045823A1
Authority
WO
WIPO (PCT)
Prior art keywords
note
store
application
computing device
user
Prior art date
Application number
PCT/US2018/037046
Other languages
English (en)
Inventor
Thomas Buckley
Maria CIRIMELE
Original Assignee
Google Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google Llc filed Critical Google Llc
Priority to EP18740372.0A priority Critical patent/EP3652629A1/fr
Priority to CN201880055743.5A priority patent/CN111065996A/zh
Publication of WO2019045823A1 publication Critical patent/WO2019045823A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/171Editing, e.g. inserting or deleting by use of digital ink
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/22Details of telephonic subscriber devices including a touch pad, a touch sensor or a touch detector

Definitions

  • Pen enabled devices are becoming more commonplace and display digitizers are becoming standardized components of laptop computers and other computing devices.
  • Pen input is well suited to quickly memorialize ideas and inspirations as they come to a user, particularly ideas that may be more easily expressed visually as a drawing or sketch.
  • it is difficult for many users to predict when inspiration may arise effective use of pen enabled devices may prove to be challenging.
  • pen enabled devices may enter into a locked state automatically after a period of inactivity, or the user may manually lock the device, for example when the user is at a meeting.
  • the user may first be presented with a lock screen that requests a PIN, password, biometrics, or other credentials.
  • the user provides the requested credentials to unlock the device, and launches a note taking application to begin writing a note. This process can take the user away from their thought processes, which discourages spontaneous note-taking with the pen enabled device.
  • a note-taking application may be provided as a unified package that includes a full application for an unlocked state of the device, and a limited application for a locked state of the device.
  • a user may perform a trigger action, such as swiping down from a corner, when the device is in a standby mode or displaying a lock screen.
  • the device may execute the limited application, allowing the user to write notes while the device remains in a locked state.
  • the limited application accesses a sandboxed local note store with configurable note persistence, but can communicate with the full application by using secure API calls.
  • the invention may provide a method comprising detecting a trigger action while a computing device is in a locked state, and in response to detecting the trigger action, displaying on a display of the computing device a locked state user interface of a note editor suitable for use by a user to make written notes for example comprising text and/or drawings.
  • the method may then further comprise receiving using the locked state user interface a user input note into the note editor, while the computing device remains in the locked state.
  • the user input note may for example be input by the user using a pen wherein the locked state used interface provides pen input functionality.
  • the user input note is then stored into a local note store.
  • the local note store may be separate or distinct from data, such as user input notes or a user account note store, that are accessible from the computing device when in an unlocked state, but that are not accessible when in the locked state.
  • the locked state may for example be a locked state for a particular user account such that an unlock action or command provides unlocked access to that user account, and the local note store and user account note store may then be associated with that particular user account.
  • an unlocked state user interface of a note editor may be provided to enable a user to enter and edit user input notes.
  • the locked and unlocked state user interfaces may be interfaces for a respective limited note taking application and a respective full note taking application which may both form part of a note editor application package.
  • the respective applications may for example be arranged to communicate using suitable API calls, and may be part of a unified application providing a consistent look and feel.
  • the invention also provides apparatus, such as a computing device for example a pen enabled and/or portable computing device, implementing the described methods, and computer readable media carrying computer program code arranged to put into effect the described methods when carried out on suitable apparatus.
  • apparatus such as a computing device for example a pen enabled and/or portable computing device, implementing the described methods, and computer readable media carrying computer program code arranged to put into effect the described methods when carried out on suitable apparatus.
  • aspects of the subject technology may provide a method for accessing a note taking application from a locked computing device.
  • the method includes detecting a trigger action while the computing device is in a locked state for a user account.
  • the method further includes providing for display, on a display device, a note editor in response to detecting the trigger action.
  • the method further includes receiving, from the display device, user input for the note editor while the computing device remains in the locked state for the user account.
  • the method further includes storing, into a local note store associated with the user account, a note based on the user input, wherein the local note store is separate from locked data of the user account that is accessible from the computing device in an unlocked state.
  • aspects of the subject technology may provide a system for accessing a note taking application from a locked computing device.
  • the system includes one or more processors, and a machine-readable medium including instructions stored therein, which when executed by the processors, cause the processors to perform operations including detecting a trigger action while a computing device is in a locked state for a user account.
  • the operations further include providing for display, on a display device, a note editor in response to detecting the trigger action.
  • the operations further include receiving, from the display device, user input for the note editor while the computing device remains in the locked state for the user account.
  • the operations further include storing, into a local note store associated with the user account, a note based on the user input, wherein the local note store is separate from locked data of the user account that is accessible from the computing device in an unlocked state.
  • aspects of the subject technology may provide a non-transitory machine- readable medium, which when executed by one or more processors, cause the processors to perform operations for accessing a note taking application from a locked computing device.
  • the operations include detecting a trigger action while a computing device is in a locked state for a user account.
  • the operations further include providing for display, on a display device, a note editor in response to detecting the trigger action.
  • the operations further include receiving, from the display device, user input for the note editor while the computing device remains in the locked state for the user account.
  • the operations further include storing, into a local note store associated with the user account, a note based on the user input, wherein the local note store is separate from locked data of the user account that is accessible from the computing device in an unlocked state.
  • FIG. 1 depicts a diagram of a system for providing access to a note taking application from a locked computing device, according to aspects of the subject technology.
  • FIG. 2A depicts a user interface for a lock screen of a device, according to aspects of the subject technology.
  • FIG. 2B depicts a user interface for a limited note taking application executing while a device remains in a locked state, according to aspects of the subject technology.
  • FIG. 2C depicts a user interface of an operating system displaying notifications triggered by a full note taking application after a device is unlocked, according to aspects of the subject technology.
  • FIG. 2D depicts a user interface for a full note taking application executing after a device is unlocked, according to aspects of the subject technology.
  • FIG. 3 shows a flowchart illustrating a method for providing access to a note taking application from a locked computing device, according to aspects of the subject technology.
  • FIG. 4 conceptually illustrates an example electronic system with which some implementations of the subject technology can be implemented.
  • FIG. 1 illustrates an exemplary system 100 for providing access to a note taking application from a locked computing device, according to aspects of the subject technology.
  • System 100 includes computing device 110, network 170, and application server 180.
  • Computing device 110 may be coupled to application server 180 over network 170.
  • Computing device 110 includes processor 120, display or display device 122, network module 124, memory 130, local note store 150, and user account note store 160.
  • Memory 130 includes note editor application package 140, which includes limited application 142 and full application 144. Note that while local note store 150 and user account note store 160 are shown as separate logical storage entities, they may both be stored on the same physical storage media.
  • computing device 110 is a pen enabled device that may receive pen input from display device 122.
  • computing device 110 may be a desktop all-in-one computer, tablet or convertible computer, laptop computer, smart phone, portable gaming console, or other device having a display device 122 supporting pen input.
  • pen input is used to refer generally to input from a pen or a stylus that can interface with display device 122 of computing device 110.
  • the pen may interface with capacitive or resistive touchscreens, display digitizers, peripheral tablet devices, or other input devices coupled to or integrated with display device 122.
  • display device 122 may correspond to a display projector or augmented reality eyewear, in which case the pens may correspond to air pens that provide pen input without contacting a physical surface.
  • a user desiring to take notes with computing device 110 may, for example, access an application storefront supported by application server 180 to download and install note editor application package 140 onto computing device 110.
  • computing device 110 may utilize network module 124, for example an Ethernet adapter, wireless card or cellular modem, to communicate with application server 180 over network 170.
  • note editor application package 140 may be provided on installable media, for example on an optical disc, flash memory card, or other device.
  • note editor application package 140 may be preinstalled onto computing device 110, or note editor application package 140 may be integrated as part of an operating system of computing device 110.
  • the note editor application package 140 includes at least two components: a limited application 142, which corresponds to a note taking application that runs while computing device 110 is in a locked state, and full application 144, which corresponds to a note taking application that runs while computing device 110 is in an unlocked state.
  • a limited application 142 which corresponds to a note taking application that runs while computing device 110 is in a locked state
  • full application 144 which corresponds to a note taking application that runs while computing device 110 is in an unlocked state.
  • FIG. 1 illustrates both limited application 142 and full application 144 in memory 130, in other aspects of the subject technology, limited application 142 and full application 144 may be individually loaded on demand into memory 130, for example to reduce memory usage.
  • Limited application 142 may provide limited functionality compared to full application 144, for example by providing a reduced feature set and/or a simplified interface more suitable for quick note taking.
  • both limited application 142 and full application 144 are part of the same unified application, or note editor application package 140, a consistent look and feel may still be presented to the user, and the applications may present the same application name or title to the user (see e.g. "Note Editor" in FIG. 2B, FIG. 2C and FIG. 2D) without presenting any distinctions between the limited and full versions.
  • Note editor application package 140 may be executed in the context of a user account of a particular user. This user account may be secured against unauthorized access by an authentication requirement, such as by username and password, personal identification number (PIN), biometric indicators such as a fingerprint, or another credential.
  • a data profile associated with the user account may store data associated with the user account, and may be encrypted for additional security. This data profile may include user account note store 160, which contains notes stored and managed by full application 144. Data within the data profile is accessible while the user is logged into the user account and computing device 110 is in an unlocked state.
  • limited application 142 is not granted direct access to user account note store 160. Instead, limited application 142 is granted access to local note store 150, which is separate and sandboxed from user account note store 160. Local note store 150 may further be associated with the user account, rather than being shared with all users of computing device 110.
  • API calls may be defined for secured communications within a unified application, such as note editor application package 140.
  • API calls can use intermediate storage, such as local note store 150, to store and retrieve API messages.
  • API calls may be defined for adding and removing API messages from message queues that are reserved for each application within a unified application.
  • the API messages may be encrypted.
  • limited application 142 can communicate with full application
  • full application 144 by using API calls to store API messages in a first message queue of local note store 150.
  • full application 144 may use API calls to retrieve API messages from the first message queue in local note store 150.
  • Full application 144 may process the retrieved API messages.
  • full application 144 can communicate with limited application 142 by using API calls to store API messages in a second message queue of local note store 150.
  • limited application 142 may use the API calls to retrieve the API messages from the second message queue in local note store 150.
  • Limited application 142 may process the retrieved API messages.
  • a lock screen of computing device 1 10 may be limited to providing methods of unlocking computing device 110.
  • the lock screen of computing device 110 may be augmented with additional features for accessing limited application 142. Some of these additional features are illustrated in the lock screen depicted in FIG. 2A.
  • FIG. 2A depicts a user interface 222A for a lock screen of a device, according to aspects of the subject technology.
  • User interface 222A includes a corner 224, an application icon 226, and a user account 228.
  • user interface 222A may correspond to a user interface shown on display device 122 of FIG. 1 when computing device 110 is in a locked state.
  • a user account 228 or "John Doe" is already logged into computing device 110, but since computing device 110 is in a locked state for user account 228, user interface 222A prompts the user to enter credentials, such as a PIN or password, to unlock computing device 110.
  • credentials such as a PIN or password
  • the user may access a note editor of limited application 142 by performing a trigger action.
  • processor 120 may execute limited application 142 in the background while computing device 110 is in a locked state.
  • limited application 142 provides one or more modifications to the lock screen to enable access to the note editor via the trigger action.
  • Limited application 142 may also perform the detecting of the trigger action.
  • an operating system of computing device 110 may determine installed applications having, or which are, lock screen compatible applications. The operating system may also perform the detecting of trigger actions for those compatible applications.
  • the triggering action may correspond to a touch gesture, such as swiping down from corner 224, when display device 122 is a touch sensitive device.
  • Another action may correspond to interacting with a user interface element, such as tapping application icon 226 with a touch or a mouse click.
  • Yet another action may correspond to pen movements, such as removing a pen from an integrated pen holder of computing device 110, bringing the pen into proximity of display device 122, or touching display device 122 with the pen. While these examples are described in conjunction with user interface 222A, actions may also be detected when display device 122 is off or dimmed in a low power state.
  • user interface 222A of FIG. 2A may transition to user interface 222B of FIG. 2B.
  • a screen transition effect similar to turning a page of a book may be provided, but any suitable transition may be utilized. Note that while the lock screen is replaced entirely in this example, other aspects of the subject technology may display user interface 222B as a part of user interface 222A.
  • an operating system of computing device 110 may cause processor 120 to execute limited application 142 in response to the trigger action, for example by creating a new process or by resuming a prior suspended process.
  • User interface 222A may thus be replaced with a user interface displaying an execution of limited application 142, as shown in FIG. 2B.
  • FIG. 2B depicts a user interface 222B for a limited note taking application executing while a device remains in a locked state, according to aspects of the subject technology.
  • User interface 222B of FIG. 2B includes back button 230, note 232, user account 234, persistence setting 236, and new note button 238.
  • user interface 222B may correspond to a user interface shown on display device 122 of FIG. 1 when computing device 110 executes limited application 142 while remaining in a locked state.
  • user interface 222B may provide one note at a time, or note
  • Note 232 may initially be blank, and the user may write freeform notes using a pen, including text, drawings, or anything else the user wants to memorialize.
  • display device 122 may receive user input corresponding to pen input from the user, or a running to do list as shown in note 232.
  • the user input is received while computing device 110 remains in a locked state, as indicated by user account 234 showing a locked icon.
  • user interface 222B may provide a time and date when note 232 was created and when note 232 was last saved to non-volatile storage, such as to local note store 150.
  • a new note button 238 is provided to allow the user to indicate when note 232 is complete and a new note is ready to be written, for example to write about a different topic or to otherwise provide a logical break in the notes.
  • note 232 may be saved to user account note store 160, for example by sending a message to full application 144 via API calls.
  • Note 232 may then be removed or deleted from local note store 150, and a new empty note may appear in user interface 222B. This process may be considered to be a manual flushing of note 232 from local note store 150 into user account note store 160.
  • the user may utilize back button 230 to transition back to the lock screen of user interface 222A.
  • the user may also place computing device 110 into a lower power state, such as a standby mode, a low power mode, or an off state.
  • power saving settings of computing device 110 may cause an automatic transition after a timeout to the lock screen or the lower power state.
  • limited application 142 becomes inactive and may close or suspend.
  • an action may be performed on note 232 based on persistence setting 236.
  • persistence setting 236 may be set according to user preference.
  • note 232 may be persisted to local note store 150 after limited application 142 becomes inactive, or "after exiting note editor".
  • the contents of note 232 may be retrieved from local note store 150 and presented to the user in user interface 222B. Since there is a risk of note 232 being observed by a third party as entry into limited application 142 is not secured by user authentication, the "retain note” setting may be most appropriate for working with notes that the user does not mind being potentially made public, such as grocery lists or other less sensitive information.
  • note 232 may be saved to user account note store 160 after limited application 142 becomes inactive, or "after exiting note editor". After saving, note 232 may be cleared and deleted from local note store 150.
  • the "save note and clear” setting may perform the same actions as when the user utilizes new note button 238, as described above. This process may be considered to be an automatic flushing of note 232 from local note store 150 into user account note store 160.
  • the "save note and clear” setting may be most appropriate for working with high confidentiality notes as a third party cannot easily access note 232 once note 232 is flushed to user account note store 160, where note 232 can be protected as encrypted data within the user account's data profile.
  • note 232 may be saved to user account note store 160 after limited application 142 becomes inactive, or "after exiting note editor". However, unlike the "save note and clear” setting, note 232 may be retained in local note store 150. Further, when changes are made to the flushed note by full application 144, the changes may be synchronized back to note 232 in local note store 150. Accordingly, the "user persistent note” setting may be most appropriate for a note that the user anticipates editing while in both the locked and unlocked states of computing device 110, such as a running to do list.
  • user interface 222B is all optional with the exception of a note editor for editing note 232.
  • back button 230 may be omitted
  • user account 234 may be omitted
  • persistence setting 236 may be omitted
  • new note button 238 may be omitted.
  • features shown in user interface 222B may be moved to a user interface of full application 144.
  • persistence setting 236 may be set in a preferences window provided by full application 144.
  • persistence setting 236 may be communicated from full application 144 to limited application 142 using API calls.
  • limited application 142 may utilize API calls to communicate with full application 144, rather than directly accessing user account note store 160.
  • full application 144 utilizes API calls to communicate with limited application 142, rather than directly accessing local note store 150. Examples of these communications are described in further detail below in conjunction with FIG. 2C and FIG. 2D.
  • FIG. 2C depicts a user interface 222C of an operating system displaying notifications triggered by a full note taking application after a device is unlocked, according to aspects of the subject technology.
  • User interface 222C includes notification 240.
  • a number of actions may have already occurred.
  • the user may have entered limited application 142 and selected the "save note and clear" setting in persistence setting 236.
  • the user may have written a new note concerning a grocery list.
  • the user may have used new note button 238 to manually flush the note.
  • the user may have closed limited application 142 by returning to the lock screen or placing computing device 110 into a lower power state.
  • persistence setting 236 is set to "save note and clear"
  • the grocery list note is automatically flushed when limited application 142 closes.
  • the user may have written a new note concerning a reminder to "wash the car today", which may be flushed in a similar manner.
  • each manual or automatic flushing may be carried out by limited application 142 sending a message to full application 144 via API calls.
  • Each message may include note contents and associated metadata, which can include note and message identifiers, a creation date and timestamp, a message sending time, a message flushing time, and a context for the message. These messages may be sent immediately upon flushing, or may be stored in a queue for sending after computing device 110 transitions from a locked state to an unlocked state, and vice versa.
  • the note contents in each message may include an entirety of the note, or may alternatively include a delta update for updates to existing notes.
  • the context in each message may indicate a surrounding context that triggered the sending of the message. For example, the context may indicate whether the user used new note button 238 to cause a manual flushing, or whether limited application 142 closed and caused an automatic flushing due to a power saving timeout or a transition to a lock screen or a lower power mode.
  • full application 144 may be executing in the background, in which case full application 144 can wake up and resume execution. However, if full application 144 is not actively executing, then the operating system of computing device 110 may cause full application 144 to begin executing so that it can receive and process the messages.
  • full application 144 may provide a lightweight message processing module to process the messages, allowing deferred execution of a full featured note editing application.
  • full application 144 may create a new note or update an existing note within user account note store 160. Further, full application 144 may determine an appropriate action to perform based on the metadata and the context in each message. For example, processor 120 may calculate a weighted sum for each of the messages, wherein older sending times are assigned more points compared to more recent sending times, and wherein automatic flushing is lower weighted compared to manual flushing. If the weighted sum exceeds a threshold value, then full application 144 may conclude that the associated note is a lower priority note and that sending a notification may be the most appropriate action.
  • the threshold value may be global for all users, user specific, or user defined.
  • sending times may be assigned a value of 1 point per minute in the past
  • automatic flushing may be assigned a 2x weight
  • manual flushing may be assigned a lx weight
  • the threshold value may be set to 5.
  • the received messages may include context indicating that the notes were both automatically flushed
  • metadata may indicate sending times of 12:05 and 12: 10, or 15 and 10 minutes in the past compared to the current time of 12:20.
  • this is an example for processing the messages, and any suitable method may be utilized to determine the appropriate actions.
  • full application 144 may send a notification to an operating system, which in turn notifies the user as shown in notification 240 of FIG. 2C.
  • the notification may include an indication that the note was written while computing device 110 was in a locked state, a time that the note was written, and a summary of the note, which may include portions of text or drawings from the note.
  • text in the note may be processed through optical character recognition (OCR) to provide text in a consistent font, as shown in notification 240.
  • OCR optical character recognition
  • the user may then decide whether to continue editing the notes or to defer action until later. For example, if the operating system detects a tapping or clicking on notification 240, then an associated note may be opened up for editing in full application 144.
  • full application 144 may decide that automatically opening a note for editing in full application 144 is the most appropriate action.
  • the user may use new note button 238 to manually flush note 232. The user may then use back button 230 to return to the lock screen of user interface 222A, and proceed to unlock computing device 110.
  • the user may tap on the lock icon of user account 234, and a login popup may appear on user interface 222B, wherein the user can proceed to unlock computing device 110.
  • user interface 222A or 222B may transition to the user interface shown in FIG. 2D.
  • FIG. 2D depicts a user interface 222D for a full note taking application executing after a device is unlocked, according to aspects of the subject technology.
  • User interface 222D includes note 242 and indicator 244.
  • Full application 144 may create or update a corresponding note 242 in user account note store 160, wherein note 242 is synchronized with content from note 232.
  • Full application 144 may further examine the metadata and context of the incoming API message and observe that note 232 was manually flushed on user interface 222B at 12:20, or more specifically at 12:20, zero (0) seconds. The current time may be ascertained to be 12:20, thirty (30) seconds.
  • full application 144 may instead work with its own corresponding copy, or note 242 in user account note store 160. Accordingly, as shown in user interface 222D, a note editor application window is opened automatically with note 242 displayed for editing, along with any other notes the user may have stored in user account note store 160, such as the BBQ list and pie recipe notes.
  • stored metadata may also indicate that note 242 is a "persistent note", as reflected by indicator 244. Any changes to note 242 can be communicated back to limited application 142 by an additional message via API calls when computing device 110 transitions from an unlocked state into a locked state.
  • Limited application 142 may update its corresponding note 232 in a similar manner as described above.
  • a user may also specify a "persistent note” from full application 144, for example by browsing user account note store 160 and marking a particular note to be a "persistent note”.
  • the persistent note can be provided to limited application 142 using API calls, and persistence setting 236 may be automatically set to "use persistent note”.
  • FIG. 3 shows a flowchart illustrating a method 310 for providing access to a note taking application from a locked computing device, according to aspects of the subject technology.
  • processor 120 detects a trigger action while computing device 110 is in a locked state for a user account.
  • the trigger action may include touch gestures, tapping on icons, pen movements, or other actions. Further, the detection of the trigger action may occur while display device 122 is in a dimmed low power or off state.
  • processor 120 provides for display, on display device 122, a note editor in response to detecting the trigger action of block 311.
  • a user interface of the note editor may appear similar to user interface 222B of FIG. 2B, as described above.
  • processor 120 receives, from display device
  • user input for the note editor while computing device 110 remains in the locked state for the user account For example, referring to FIG. 2B, a user may provide user input in the form of pen handwriting corresponding to the content shown in note 232. The user input is received while computing device 110 remains in the locked state for user account 234, or the "John Doe" user account.
  • processor 120 stores, into local note store
  • local note store 150 associated with the user account, note 232, wherein local note store 150 is separate from user account note store 160 that is accessible from computing device 110 in an unlocked state.
  • the local note store 150 is associated with the "John Doe" user account, but is separate from user account note store 160 that is accessible from computing device 110 in an unlocked state.
  • Block 314 may be triggered in response to a user action, such as triggering new note button 238, triggering back button 230, or pressing a power or standby button of computing device 110.
  • Block 314 may also be triggered in response to an automatic action, such as a power saving timeout back to a lock screen or to a lower power state.
  • note 232 may be further communicated and synchronized between limited application 142 and full application 144 via API calls.
  • FIG. 4 conceptually illustrates an example electronic system with which some implementations of the subject technology can be implemented.
  • Electronic system 400 can be a computer, phone, PDA, or any other sort of electronic device. Such an electronic system includes various types of computer readable media and interfaces for various other types of computer readable media.
  • Electronic system 400 includes a bus 408, processing unit(s) 412, a system memory 404, a read-only memory (ROM) 410, a permanent storage device 402, an input device interface 414, an output device interface 406, and a network interface 416.
  • ROM read-only memory
  • Bus 408 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of electronic system 400. For instance, bus 408 communicatively connects processing unit(s) 412 with ROM 410, system memory 404, and permanent storage device 402.
  • processing unit(s) 412 retrieves instructions to execute and data to process in order to execute the processes of the subject disclosure.
  • the processing unit(s) can be a single processor or a multi-core processor in different implementations.
  • ROM 410 stores static data and instructions that are needed by processing unit(s) 412 and other modules of the electronic system.
  • Permanent storage device 402 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when electronic system 400 is off.
  • Some implementations of the subject disclosure use a mass-storage device (for example, a magnetic or optical disk and its corresponding disk drive) as permanent storage device 402.
  • system memory 404 is a read-and-write memory device. However, unlike storage device 402, system memory 404 is a volatile read-and-write memory, such a random access memory. System memory 404 stores some of the instructions and data that the processor needs at runtime. In some implementations, the processes of the subject disclosure are stored in system memory 404, permanent storage device 402, or ROM 410.
  • the various memory units include instructions for processing a social endorsement for an item in accordance with some implementations. From these various memory units, processing unit(s) 412 retrieves instructions to execute and data to process in order to execute the processes of some implementations.
  • Bus 408 also connects to input and output device interfaces 414 and 406.
  • Input device interface 414 enables the user to communicate information and select commands to the electronic system.
  • Input devices used with input device interface 414 include, for example, alphanumeric keyboards and pointing devices (also called “cursor control devices").
  • Output device interfaces 406 enables, for example, the display of images generated by the electronic system 400.
  • Output devices used with output device interface 406 include, for example, printers and display devices, for example, cathode ray tubes (CRT) or liquid crystal displays (LCD). Some implementations include devices, for example, a touchscreen that functions as both input and output devices.
  • CTR cathode ray tubes
  • LCD liquid crystal displays
  • bus 408 also couples electronic system 400 to a network (not shown) through a network interface 416.
  • the computer can be a part of a network of computers (for example, a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, for example, the Internet.
  • LAN local area network
  • WAN wide area network
  • Intranet Intranet
  • the term "software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor.
  • multiple software aspects of the subject disclosure can be implemented as sub-parts of a larger program while remaining distinct software aspects of the subject disclosure.
  • multiple software aspects can also be implemented as separate programs.
  • any combination of separate programs that together implement a software aspect described here is within the scope of the subject disclosure.
  • the software programs when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
  • a computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment.
  • a computer program may, but need not, correspond to a file in a file system.
  • a program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub programs, or portions of code).
  • a computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
  • These functions described above can be implemented in digital electronic circuitry, in computer software, firmware or hardware.
  • the techniques can be implemented using one or more computer program products.
  • Programmable processors and computers can be included in or packaged as mobile devices.
  • the processes and logic flows can be performed by one or more programmable processors and by one or more programmable logic circuitry.
  • General and special purpose computing devices and storage devices can be interconnected through communication networks.
  • Some implementations include electronic components, for example, microprocessors, storage and memory that store computer program instructions in a machine- readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
  • Such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks.
  • RAM random access memory
  • ROM read-only compact discs
  • CD-R recordable compact discs
  • CD-RW rewritable compact discs
  • read-only digital versatile discs e.g., DVD-ROM, dual-layer DVD-ROM
  • flash memory e.g., SD cards, mini-SD
  • the computer-readable media can store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
  • Examples of computer programs or computer code include machine code, for example, is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
  • ASICs application specific integrated circuits
  • FPGAs field programmable gate arrays
  • “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
  • display or displaying means displaying on an electronic device.
  • the terms “computer readable medium” and “computer readable media” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
  • implementations of the subject matter described in this specification can be implemented on a computer having a display device, e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
  • a display device e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor
  • a keyboard and a pointing device e.g., a mouse or a trackball
  • Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
  • a computer can interact with a user by sending documents to and receiving documents from a device that
  • aspects of the subject technology described in this specification can be implemented in a computing system that includes a back end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation of the subject matter described in this specification, or any combination of one or more such back end, middleware, or front end components.
  • the components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network.
  • Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), an inter-network (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks).
  • LAN local area network
  • WAN wide area network
  • inter-network e.g., the Internet
  • peer-to-peer networks e.g., ad hoc peer-to-peer networks.
  • the computing system can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device).
  • client device e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device.
  • Data generated at the client device e.g., a result of the user interaction
  • any specific order or hierarchy of steps in the processes disclosed is an illustration of example approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged, or that all illustrated steps be performed. Some of the steps may be performed simultaneously. For example, in certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in aspects of the subject technology described above should not be understood as requiring such separation in all aspects of the subject technology, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
  • a phrase such as an "aspect” does not imply that such aspect is essential to the subject technology or that such aspect applies to all configurations of the subject technology.
  • a disclosure relating to an aspect may apply to all configurations, or one or more configurations.
  • a phrase such as an aspect may refer to one or more aspects and vice versa.
  • a phrase such as a “configuration” does not imply that such configuration is essential to the subject technology or that such configuration applies to all configurations of the subject technology.
  • a disclosure relating to a configuration may apply to all configurations, or one or more configurations.
  • a phrase such as a configuration may refer to one or more configurations and vice versa.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne une application de prise de notes qui peut être fournie sous la forme d'un progiciel unifié qui comprend une application complète pour un état déverrouillé du dispositif, et une application limitée pour un état verrouillé du dispositif. Un utilisateur peut effectuer une action de déclenchement, telle qu'un glissement vers le bas à partir d'un coin, lorsque le dispositif est dans un mode attente, ou l'affichage d'un écran de verrouillage. En réponse à l'action de déclenchement, le dispositif peut exécuter l'application limitée, permettant à l'utilisateur d'écrire des notes pendant que le dispositif reste dans un état verrouillé. L'application limitée accède à une mémoire de notes locale à bac à sable avec une persistance de notes configurable, mais peut communiquer avec l'application complète par utilisation d'appels d'interface de programmation d'application (API) sécurisés.
PCT/US2018/037046 2017-09-01 2018-06-12 Prise de notes sur écran de verrouillage WO2019045823A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP18740372.0A EP3652629A1 (fr) 2017-09-01 2018-06-12 Prise de notes sur écran de verrouillage
CN201880055743.5A CN111065996A (zh) 2017-09-01 2018-06-12 锁屏记笔记

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/694,729 2017-09-01
US15/694,729 US20190073347A1 (en) 2017-09-01 2017-09-01 Lockscreen note-taking

Publications (1)

Publication Number Publication Date
WO2019045823A1 true WO2019045823A1 (fr) 2019-03-07

Family

ID=62904563

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/037046 WO2019045823A1 (fr) 2017-09-01 2018-06-12 Prise de notes sur écran de verrouillage

Country Status (4)

Country Link
US (1) US20190073347A1 (fr)
EP (1) EP3652629A1 (fr)
CN (1) CN111065996A (fr)
WO (1) WO2019045823A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230273983A1 (en) * 2020-09-07 2023-08-31 Qualcomm Incorporated System and Method for Capturing Notes on a Mobile Device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100306705A1 (en) * 2009-05-27 2010-12-02 Sony Ericsson Mobile Communications Ab Lockscreen display
US20140223542A1 (en) * 2013-02-01 2014-08-07 Barnesandnoble.Com Llc Secure note system for computing device lock screen
US20160301796A1 (en) * 2015-04-13 2016-10-13 Microsoft Technology Licensing, Llc Inputting data using a mobile apparatus
WO2017100014A1 (fr) * 2015-12-11 2017-06-15 Microsoft Technology Licensing, Llc Création de notes sur un écran de verrouillage

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256008B1 (en) * 1996-12-10 2001-07-03 Motorola Computer screen saver with wireless messaging capability and method therefor
US20020173345A1 (en) * 2001-05-17 2002-11-21 Swerup Jan Ingemar Method and system for phone note taking
US7644376B2 (en) * 2003-10-23 2010-01-05 Microsoft Corporation Flexible architecture for notifying applications of state changes
BRPI0419168B1 (pt) * 2004-09-24 2017-05-16 Nokia Corp dispositivo eletrônico compreendendo a detecção de uma entrada de um usuário durante um modo de operação inativo
US20070016958A1 (en) * 2005-07-12 2007-01-18 International Business Machines Corporation Allowing any computer users access to use only a selection of the available applications
US7707400B2 (en) * 2005-10-31 2010-04-27 Microsoft Corporation Direct computing experience
US7665081B1 (en) * 2006-05-06 2010-02-16 Kaspersky Lab, Zao System and method for difference-based software updating
US9049302B2 (en) * 2007-01-07 2015-06-02 Apple Inc. Portable multifunction device, method, and graphical user interface for managing communications received while in a locked state
US8726184B2 (en) * 2007-11-29 2014-05-13 Red Hat, Inc. Systems, apparatus and methods for a messaging system
US20100146437A1 (en) * 2008-12-04 2010-06-10 Microsoft Corporation Glanceable animated notifications on a locked device
US9197738B2 (en) * 2008-12-04 2015-11-24 Microsoft Technology Licensing, Llc Providing selected data through a locked display
US8331992B2 (en) * 2008-12-19 2012-12-11 Verizon Patent And Licensing Inc. Interactive locked state mobile communication device
US9338274B2 (en) * 2009-10-02 2016-05-10 Blackberry Limited Method of interacting with electronic devices in a locked state and handheld electronic device configured to permit interaction when in a locked state
US20110283241A1 (en) * 2010-05-14 2011-11-17 Google Inc. Touch Gesture Actions From A Device's Lock Screen
US8811948B2 (en) * 2010-07-09 2014-08-19 Microsoft Corporation Above-lock camera access
US9606643B2 (en) * 2011-05-02 2017-03-28 Microsoft Technology Licensing, Llc Extended above the lock-screen experience
US9076008B1 (en) * 2011-06-27 2015-07-07 Amazon Technologies, Inc. Content protection on an electronic device
US20130069962A1 (en) * 2011-09-15 2013-03-21 Microsoft Corporation Active Lock Wallpapers
US9395800B2 (en) * 2011-09-30 2016-07-19 Qualcomm Incorporated Enabling instant handwritten input on mobile computing devices
US20130305354A1 (en) * 2011-12-23 2013-11-14 Microsoft Corporation Restricted execution modes
US20130283199A1 (en) * 2012-04-24 2013-10-24 Microsoft Corporation Access to an Application Directly from a Lock Screen
KR101921161B1 (ko) * 2012-05-15 2018-11-22 삼성전자 주식회사 메모 기능 수행을 위한 단말의 제어 방법 및 그 단말
US9009630B2 (en) * 2012-06-05 2015-04-14 Microsoft Corporation Above-lock notes
WO2013188590A2 (fr) * 2012-06-12 2013-12-19 Realnetworks, Inc. Systèmes et procédés pour une api vidéo sensible au contexte
US9479387B2 (en) * 2012-06-22 2016-10-25 Salesforce.Com, Inc. Methods and systems for priority-based notifications for mobile devices
US9665178B2 (en) * 2012-08-01 2017-05-30 Blackberry Limited Selective inbox access in homescreen mode on a mobile electronic device
KR101761190B1 (ko) * 2013-02-22 2017-07-25 삼성전자 주식회사 휴대 단말기의 사용자 인터페이스 제공 방법 및 장치
KR102214974B1 (ko) * 2013-08-29 2021-02-10 삼성전자주식회사 잠금 화면 상에서 필기 형태의 사용자 입력과 관련된 기능을 실행하기 위한 장치 및 방법
US9396346B2 (en) * 2014-06-12 2016-07-19 Blackberry Limited System and method for accessing and updating secured data
US9542247B2 (en) * 2014-09-19 2017-01-10 Microsoft Technology Licensing, Llc Content sharing between sandboxed apps
KR102369126B1 (ko) * 2015-07-10 2022-03-02 삼성전자주식회사 메모 기능을 제공하는 전자 장치 및 그 방법
US10055368B2 (en) * 2016-02-26 2018-08-21 Sandisk Technologies Llc Mobile device and method for synchronizing use of the mobile device's communications port among a plurality of applications
US20170329952A1 (en) * 2016-05-13 2017-11-16 Microsoft Technology Licensing, Llc Casual Digital Ink Applications
US9979680B2 (en) * 2016-07-21 2018-05-22 Fujitsu Limited Smart notification scheduling and modality selection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100306705A1 (en) * 2009-05-27 2010-12-02 Sony Ericsson Mobile Communications Ab Lockscreen display
US20140223542A1 (en) * 2013-02-01 2014-08-07 Barnesandnoble.Com Llc Secure note system for computing device lock screen
US20160301796A1 (en) * 2015-04-13 2016-10-13 Microsoft Technology Licensing, Llc Inputting data using a mobile apparatus
WO2017100014A1 (fr) * 2015-12-11 2017-06-15 Microsoft Technology Licensing, Llc Création de notes sur un écran de verrouillage

Also Published As

Publication number Publication date
US20190073347A1 (en) 2019-03-07
CN111065996A (zh) 2020-04-24
EP3652629A1 (fr) 2020-05-20

Similar Documents

Publication Publication Date Title
US9325775B2 (en) Clipboard
EP3126967B1 (fr) Gestionnaire adaptatif de panneaux d'interface utilisateur
US20150199082A1 (en) Displaying actionable items in an overscroll area
US11243683B2 (en) Context based gesture actions on a touchscreen
US9098695B2 (en) Secure note system for computing device lock screen
US20150261411A1 (en) Displaying collaboration icons for collaboration states
US8451246B1 (en) Swipe gesture classification
US10528252B2 (en) Key combinations toolbar
US20160196419A1 (en) Multi-action lock screen
US20110239110A1 (en) Method and System for Selecting Content Using A Touchscreen
US20170054767A1 (en) Transferring application state between devices
WO2017023844A1 (fr) Interface utilisateur pour dispositif à écran tactile en communication avec un clavier physique
US8654978B2 (en) Apparatus, method, and computer program product for access control to a mobile terminal
JP2005129060A (ja) ログイン前のデータアクセス
US20200379635A1 (en) User interfaces with increased visibility
CN114329374A (zh) 基于设备上的用户输入模式的数据保护系统
US9524159B2 (en) Updating an operating system
JP6169620B2 (ja) 言語独立確率論的コンテンツ照合
EP2602705A1 (fr) Dispositif électronique et son procédé de contrôle
US20150205516A1 (en) System and method for processing touch input
US20190073347A1 (en) Lockscreen note-taking
US10712914B2 (en) Method, apparatus and computer program product for user interface dynamic display based on time that a device has been in locked state
US9519395B1 (en) Presenting windows or tabs
EP3959591A1 (fr) Systèmes et procédés de fourniture de gestes de trajet continu et de touche de suppression au niveau d'un clavier tactile
US20130074006A1 (en) Command invocation during log-in user authentication to an operating system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18740372

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2018740372

Country of ref document: EP

Effective date: 20200214

NENP Non-entry into the national phase

Ref country code: DE